Home / Journals / CMC / Vol.73, No.2, 2022
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Linear Active Disturbance Rejection Control with a Fractional-Order Integral Action

    Maâmar Bettayeb1,3, Rachid Mansouri2,*, Ubaid M. Al-Saggaf3,4, Abdulrahman U. Alsaggaf3,4, Mohammed Moinuddin3,4
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3057-3079, 2022, DOI:10.32604/cmc.2022.025751
    Abstract Linear active disturbance rejection control (LADRC) is a powerful control structure thanks to its performance in uncertainties, internal and external disturbances estimation and cancelation. An extended state observer (ESO) based controller is the key to the LADRC method. In this article, the LADRC scheme combined with a fractional-order integral action (FOI-LADRC) is proposed to improve the robustness of the standard LADRC. Using the robust closed-loop Bode’s ideal transfer function (BITF), an appropriate pole placement method is proposed to design the set-point tracking controller of the FOI-LADRC scheme. Numerical simulations and experimental results on a cart-pendulum system will illustrate the effectiveness… More >

  • Open AccessOpen Access

    ARTICLE

    Optimal Deployment of Heterogeneous Nodes to Enhance Network Invulnerability

    Qian Sun1,2, Fengbo Yang1,2, Xiaoyi Wang2,3,*, Jiping Xu1,2, Huiyan Zhang1,2, Li Wang1,2, Jiabin Yu1,2, Xiao Peng1,2, Ruichao Wang4
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3081-3097, 2022, DOI:10.32604/cmc.2022.029366
    Abstract Wireless sensor networks (WSN) can be used in many fields. In wireless sensor networks, sensor nodes transmit data in multi hop mode. The large number of hops required by data transmission will lead to unbalanced energy consumption and large data transmission delay of the whole network, which greatly affects the invulnerability of the network. Therefore, an optimal deployment of heterogeneous nodes (ODHN) algorithm is proposed to enhance the invulnerability of the wireless sensor networks. The algorithm combines the advantages of DEEC (design of distributed energy efficient clustering) clustering algorithm and BAS (beetle antenna search) optimization algorithm to find the globally… More >

  • Open AccessOpen Access

    ARTICLE

    R-IDPS: Real Time SDN-Based IDPS System for IoT Security

    Noman Mazhar1,2, Rosli Saleh1,*, Reza Zaba1,3, Muhammad Zeeshan4, M. Muzaffar Hameed1, Nauman Khan1
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3099-3118, 2022, DOI:10.32604/cmc.2022.028285
    Abstract The advent of the latest technologies like the Internet of things (IoT) transforms the world from a manual to an automated way of lifestyle. Meanwhile, IoT sector open numerous security challenges. In traditional networks, intrusion detection and prevention systems (IDPS) have been the key player in the market to ensure security. The challenges to the conventional IDPS are implementation cost, computing power, processing delay, and scalability. Further, online machine learning model training has been an issue. All these challenges still question the IoT network security. There has been a lot of research for IoT based detection systems to secure the… More >

  • Open AccessOpen Access

    ARTICLE

    Efficient Segmentation Approach for Different Medical Image Modalities

    Walid El-Shafai1,2, Amira A. Mahmoud1, El-Sayed M. El-Rabaie1, Taha E. Taha1, Osama F. Zahran1, Adel S. El-Fishawy1, Naglaa F. Soliman3, Amel A. Alhussan4,*, Fathi E. Abd El-Samie1
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3119-3135, 2022, DOI:10.32604/cmc.2022.028935
    Abstract This paper presents a study of the segmentation of medical images. The paper provides a solid introduction to image enhancement along with image segmentation fundamentals. In the first step, the morphological operations are employed to ensure image detail protection and noise-immunity. The objective of using morphological operations is to remove the defects in the texture of the image. Secondly, the Fuzzy C-Means (FCM) clustering algorithm is used to modify membership function based only on the spatial neighbors instead of the distance between pixels within local spatial neighbors and cluster centers. The proposed technique is very simple to implement and significantly… More >

  • Open AccessOpen Access

    ARTICLE

    Anchor-free Siamese Network Based on Visual Tracking

    Shaozhe Guo1, Yong Li1,*, Xuyang Chen2, Youshan Zhang1
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3137-3148, 2022, DOI:10.32604/cmc.2022.026784
    Abstract The Visual tracking problem can usually be solved in two parts. The first part is to extract the feature of the target and get the candidate region. The second part is to realize the classification of the target and the regression of the bounding box. In recent years, Siameses network in visual tracking problem has always been a frontier research hotspot. In this work, it applies two branches namely search area and tracking template area for similar learning to track. Some related researches prove the feasibility of this network structure. According to the characteristics of two branch shared networks in… More >

  • Open AccessOpen Access

    ARTICLE

    State of Health Estimation of LiFePO4 Batteries for Battery Management Systems

    Areeb Khalid1,*, Syed Abdul Rahman Kashif1, Noor Ul Ain1, Ali Nasir2
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3149-3164, 2022, DOI:10.32604/cmc.2022.029322
    Abstract When considering the mechanism of the batteries, the capacity reduction at storage (when not in use) and cycling (during use) and increase of internal resistance is because of degradation in the chemical composition inside the batteries. To optimize battery usage, a battery management system (BMS) is used to estimate possible aging effects while different load profiles are requested from the grid. This is specifically seen in a case when the vehicle is connected to the net (online through BMS). During this process, the BMS chooses the optimized load profiles based on the least aging effects on the battery pack. The… More >

  • Open AccessOpen Access

    ARTICLE

    Bilateral Contract for Load Frequency and Renewable Energy Sources Using Advanced Controller

    Krishan Arora1, Gyanendra Prasad Joshi2, Mahmoud Ragab3,4,5,*, Muhyaddin Rawa6,7,8, Ahmad H. Milyani6,7, Romany F. Mansour9, Eunmok Yang10
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3165-3180, 2022, DOI:10.32604/cmc.2022.026966
    Abstract Reestablishment in power system brings in significant transformation in the power sector by extinguishing the possession of sound consolidated assistance. However, the collaboration of various manufacturing agencies, autonomous power manufacturers, and buyers have created complex installation processes. The regular active load and inefficiency of best measures among varied associates is a huge hazard. Any sudden load deviation will give rise to immediate amendment in frequency and tie-line power errors. It is essential to deal with every zone’s frequency and tie-line power within permitted confines followed by fluctuations within the load. Therefore, it can be proficient by implementing Load Frequency Control… More >

  • Open AccessOpen Access

    ARTICLE

    Eighteen-Element Antenna for Metal-Rimmed Smartphone Sub-6 GHz LTE42 Band Applications

    Saqer S. Alja’Afreh1,*, Mallak H. Alshamaileh1, Eqab Almajali2, Jawad Yousaf3, Amir Altaf4
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3181-3198, 2022, DOI:10.32604/cmc.2022.029863
    Abstract Due to the limited space and large mutual coupling levels, the design of sub-6 GHz massive Multi-Input Multi-Output (m-MIMO) smartphone antenna system attracts antennas’ designers and engineers worldwide. Therefore, this paper presents 18-element m-MIMO antenna system that covers the long-term evolution 42 (LTE42) frequency band (3.4–3.6 GHz) for the fifth generation (5G) applications in metallic frame smartphones. The proposed array system is etched on the long sides of a metal rim of the mobile chassis symmetrically, which is electrically connected to the system ground plane with zero ground clearance. A low-profile frame of height 7 mm (λ/12.3) is symmetrically placed… More >

  • Open AccessOpen Access

    ARTICLE

    Securing Consumer Internet of Things for Botnet Attacks: Deep Learning Approach

    Tariq Ahamed Ahanger1,*, Abdulaziz Aldaej1, Mohammed Atiquzzaman2, Imdad Ullah1, Mohammed Yousuf Uddin1
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3199-3217, 2022, DOI:10.32604/cmc.2022.027212
    Abstract DDoS attacks in the Internet of Things (IoT) technology have increased significantly due to its spread adoption in different industrial domains. The purpose of the current research is to propose a novel technique for detecting botnet attacks in user-oriented IoT environments. Conspicuously, an attack identification technique inspired by Recurrent Neural networks and Bidirectional Long Short Term Memory (BLRNN) is presented using a unique Deep Learning (DL) technique. For text identification and translation of attack data segments into tokenized form, word embedding is employed. The performance analysis of the presented technique is performed in comparison to the state-of-the-art DL techniques. Specifically,… More >

  • Open AccessOpen Access

    ARTICLE

    Wind Driven Optimization-Based Medical Image Encryption for Blockchain-Enabled Internet of Things Environment

    C. S. S. Anupama1, Raed Alsini2, N. Supriya3, E. Laxmi Lydia4, Seifedine Kadry5, Sang-Soo Yeo6, Yongsung Kim7,*
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3219-3233, 2022, DOI:10.32604/cmc.2022.030267
    Abstract Internet of Things (IoT) and blockchain receive significant interest owing to their applicability in different application areas such as healthcare, finance, transportation, etc. Medical image security and privacy become a critical part of the healthcare sector where digital images and related patient details are communicated over the public networks. This paper presents a new wind driven optimization algorithm based medical image encryption (WDOA-MIE) technique for blockchain enabled IoT environments. The WDOA-MIE model involves three major processes namely data collection, image encryption, optimal key generation, and data transmission. Initially, the medical images were captured from the patient using IoT devices. Then,… More >

  • Open AccessOpen Access

    ARTICLE

    Big Data Analytics with Artificial Intelligence Enabled Environmental Air Pollution Monitoring Framework

    Manar Ahmed Hamza1,*, Hadil Shaiba2, Radwa Marzouk3, Ahmad Alhindi4, Mashael M. Asiri5, Ishfaq Yaseen1, Abdelwahed Motwakel1, Mohammed Rizwanullah1
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3235-3250, 2022, DOI:10.32604/cmc.2022.029604
    Abstract Environmental sustainability is the rate of renewable resource harvesting, pollution control, and non-renewable resource exhaustion. Air pollution is a significant issue confronted by the environment particularly by highly populated countries like India. Due to increased population, the number of vehicles also continues to increase. Each vehicle has its individual emission rate; however, the issue arises when the emission rate crosses the standard value and the quality of the air gets degraded. Owing to the technological advances in machine learning (ML), it is possible to develop prediction approaches to monitor and control pollution using real time data. With the development of… More >

  • Open AccessOpen Access

    ARTICLE

    Face Mask Recognition for Covid-19 Prevention

    Trong Hieu Luu1, Phan Nguyen Ky Phuc2,*, Zhiqiu Yu3, Duy Dung Pham1, Huu Trong Cao1
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3251-3262, 2022, DOI:10.32604/cmc.2022.029663
    Abstract In recent years, the COVID-19 pandemic has negatively impacted all aspects of social life. Due to ease in the infected method, i.e., through small liquid particles from the mouth or the nose when people cough, sneeze, speak, sing, or breathe, the virus can quickly spread and create severe problems for people’s health. According to some research as well as World Health Organization (WHO) recommendation, one of the most economical and effective methods to prevent the spread of the pandemic is to ask people to wear the face mask in the public space. A face mask will help prevent the droplet… More >

  • Open AccessOpen Access

    ARTICLE

    Segmentation of Remote Sensing Images Based on U-Net Multi-Task Learning

    Ni Ruiwen1, Mu Ye1,2,3,4,*, Li Ji1, Zhang Tong1, Luo Tianye1, Feng Ruilong1, Gong He1,2,3,4, Hu Tianli1,2,3,4, Sun Yu1,2,3,4, Guo Ying1,2,3,4, Li Shijun5,6, Thobela Louis Tyasi7
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3263-3274, 2022, DOI:10.32604/cmc.2022.026881
    Abstract In order to accurately segment architectural features in high-resolution remote sensing images, a semantic segmentation method based on U-net network multi-task learning is proposed. First, a boundary distance map was generated based on the remote sensing image of the ground truth map of the building. The remote sensing image and its truth map were used as the input in the U-net network, followed by the addition of the building ground prediction layer at the end of the U-net network. Based on the ResNet network, a multi-task network with the boundary distance prediction layer was built. Experiments involving the ISPRS aerial… More >

  • Open AccessOpen Access

    ARTICLE

    Manta Ray Foraging Optimization with Machine Learning Based Biomedical Data Classification

    Amal Al-Rasheed1, Jaber S. Alzahrani2, Majdy M. Eltahir3, Abdullah Mohamed4, Anwer Mustafa Hilal5,*, Abdelwahed Motwakel5, Abu Sarwar Zamani5, Mohamed I. Eldesouki6
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3275-3290, 2022, DOI:10.32604/cmc.2022.029823
    Abstract The biomedical data classification process has received significant attention in recent times due to a massive increase in the generation of healthcare data from various sources. The developments of artificial intelligence (AI) and machine learning (ML) models assist in the effectual design of medical data classification models. Therefore, this article concentrates on the development of optimal Stacked Long Short Term Memory Sequence-to-Sequence Autoencoder (OSAE-LSTM) model for biomedical data classification. The presented OSAE-LSTM model intends to classify the biomedical data for the existence of diseases. Primarily, the OSAE-LSTM model involves min-max normalization based pre-processing to scale the data into uniform format.… More >

  • Open AccessOpen Access

    ARTICLE

    TP-MobNet: A Two-pass Mobile Network for Low-complexity Classification of Acoustic Scene

    Soonshin Seo1, Junseok Oh2, Eunsoo Cho2, Hosung Park2, Gyujin Kim2, Ji-Hwan Kim2,*
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3291-3303, 2022, DOI:10.32604/cmc.2022.026259
    Abstract Acoustic scene classification (ASC) is a method of recognizing and classifying environments that employ acoustic signals. Various ASC approaches based on deep learning have been developed, with convolutional neural networks (CNNs) proving to be the most reliable and commonly utilized in ASC systems due to their suitability for constructing lightweight models. When using ASC systems in the real world, model complexity and device robustness are essential considerations. In this paper, we propose a two-pass mobile network for low-complexity classification of the acoustic scene, named TP-MobNet. With inverse residuals and linear bottlenecks, TP-MobNet is based on MobileNetV2, and following mobile blocks,… More >

  • Open AccessOpen Access

    ARTICLE

    Optimal Kernel Extreme Learning Machine for COVID-19 Classification on Epidemiology Dataset

    Saud S. Alotaibi1, Amal Al-Rasheed2, Sami Althahabi3, Manar Ahmed Hamza4,*, Abdullah Mohamed5, Abu Sarwar Zamani4, Abdelwahed Motwakel4, Mohamed I. Eldesouki6
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3305-3318, 2022, DOI:10.32604/cmc.2022.029385
    Abstract Artificial Intelligence (AI) encompasses various domains such as Machine Learning (ML), Deep Learning (DL), and other cognitive technologies which have been widely applied in healthcare sector. AI models are utilized in healthcare sector in which the machines are used to investigate and make decisions based on prediction and classification of input data. With this motivation, the current study involves the design of Metaheuristic Optimization with Kernel Extreme Learning Machine for COVID-19 Prediction Model on Epidemiology Dataset, named MOKELM-CPED technique. The primary aim of the presented MOKELM-CPED model is to accomplish effectual COVID-19 classification outcomes using epidemiology dataset. In the proposed… More >

  • Open AccessOpen Access

    ARTICLE

    Support-Vector-Machine-based Adaptive Scheduling in Mode 4 Communication

    Muhammad Adnan Khan1,2, Ahmed Abu-Khadrah3, Shahan Yamin Siddiqui4, Taher M. Ghazal5,6, Tauqeer Faiz6, Munir Ahmad7, Sang-Woong Lee2,*
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3319-3331, 2022, DOI:10.32604/cmc.2022.023392
    Abstract Vehicular ad-hoc networks (VANETs) are mobile networks that use and transfer data with vehicles as the network nodes. Thus, VANETs are essentially mobile ad-hoc networks (MANETs). They allow all the nodes to communicate and connect with one another. One of the main requirements in a VANET is to provide self-decision capability to the vehicles. Cognitive memory, which stores all the previous routes, is used by the vehicles to choose the optimal route. In networks, communication is crucial. In cellular-based vehicle-to-everything (CV2X) communication, vital information is shared using the cooperative awareness message (CAM) that is broadcast by each vehicle. Resources are… More >

  • Open AccessOpen Access

    ARTICLE

    Key-Value Store Coupled with an Operating System for Storing Large-Scale Values

    Jeonghwan Im1, Hyuk-Yoon Kwon2,*
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3333-3350, 2022, DOI:10.32604/cmc.2022.029566
    Abstract The key-value store can provide flexibility of data types because it does not need to specify the data types to be stored in advance and can store any types of data as the value of the key-value pair. Various types of studies have been conducted to improve the performance of the key-value store while maintaining its flexibility. However, the research efforts storing the large-scale values such as multimedia data files (e.g., images or videos) in the key-value store were limited. In this study, we propose a new key-value store, WR-Store++ aiming to store the large-scale values stably. Specifically, it provides… More >

  • Open AccessOpen Access

    ARTICLE

    Artificial Intelligence-Enabled Cooperative Cluster-Based Data Collection for Unmanned Aerial Vehicles

    R. Rajender1, C. S. S. Anupama2, G. Jose Moses3, E. Laxmi Lydia4, Seifedine Kadry5, Sangsoon Lim6,*
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3351-3365, 2022, DOI:10.32604/cmc.2022.030229
    Abstract In recent times, sixth generation (6G) communication technologies have become a hot research topic because of maximum throughput and low delay services for mobile users. It encompasses several heterogeneous resource and communication standard in ensuring incessant availability of service. At the same time, the development of 6G enables the Unmanned Aerial Vehicles (UAVs) in offering cost and time-efficient solution to several applications like healthcare, surveillance, disaster management, etc. In UAV networks, energy efficiency and data collection are considered the major process for high quality network communication. But these procedures are found to be challenging because of maximum mobility, unstable links,… More >

  • Open AccessOpen Access

    ARTICLE

    Weather Forecasting Prediction Using Ensemble Machine Learning for Big Data Applications

    Hadil Shaiba1, Radwa Marzouk2, Mohamed K Nour3, Noha Negm4,5, Anwer Mustafa Hilal6,*, Abdullah Mohamed7, Abdelwahed Motwakel6, Ishfaq Yaseen6, Abu Sarwar Zamani6, Mohammed Rizwanullah6
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3367-3382, 2022, DOI:10.32604/cmc.2022.030067
    Abstract The agricultural sector’s day-to-day operations, such as irrigation and sowing, are impacted by the weather. Therefore, weather constitutes a key role in all regular human activities. Weather forecasting must be accurate and precise to plan our activities and safeguard ourselves as well as our property from disasters. Rainfall, wind speed, humidity, wind direction, cloud, temperature, and other weather forecasting variables are used in this work for weather prediction. Many research works have been conducted on weather forecasting. The drawbacks of existing approaches are that they are less effective, inaccurate, and time-consuming. To overcome these issues, this paper proposes an enhanced… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Stochastic Framework for the MHD Generator in Ocean

    Sakda Noinang1, Zulqurnain Sabir2, Shumaila Javeed3, Muhammad Asif Zahoor Raja4, Dostdar Ali3, Wajaree Weera5,*, Thongchai Botmart5
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3383-3402, 2022, DOI:10.32604/cmc.2022.029166
    Abstract This work aims to study the nonlinear ordinary differential equations (ODEs) system of magnetohydrodynamic (MHD) past over an inclined plate using Levenberg-Marquardt backpropagation neural networks (LMBNNs). The stochastic procedures LMBNNs are provided with three categories of sample statistics, testing, training, and verification. The nonlinear MHD system past over an inclined plate is divided into three profiles, dimensionless momentum, species (salinity), and energy (heat) conservations. The data is applied 15%, 10%, and 75% for validation, testing, and training to solve the nonlinear system of MHD past over an inclined plate. A reference data set is designed to compare the obtained and… More >

  • Open AccessOpen Access

    ARTICLE

    A Deep Learning-Based Approach for Road Surface Damage Detection

    Bakhytzhan Kulambayev1,*, Gulbakhram Beissenova2,3, Nazbek Katayev4, Bayan Abduraimova5, Lyazzat Zhaidakbayeva2, Alua Sarbassova6, Oxana Akhmetova7, Sapar Issayev4, Laura Suleimenova8, Syrym Kasenov6, Kunsulu Shadinova9, Abay Shyrakbaev10
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3403-3418, 2022, DOI:10.32604/cmc.2022.029544
    Abstract Timely detection and elimination of damage in areas with excessive vehicle loading can reduce the risk of road accidents. Currently, various methods of photo and video surveillance are used to monitor the condition of the road surface. The manual approach to evaluation and analysis of the received data can take a protracted period of time. Thus, it is necessary to improve the procedures for inspection and assessment of the condition of control objects with the help of computer vision and deep learning techniques. In this paper, we propose a model based on Mask Region-based Convolutional Neural Network (Mask R-CNN) architecture… More >

  • Open AccessOpen Access

    ARTICLE

    Sign Language Recognition and Classification Model to Enhance Quality of Disabled People

    Fadwa Alrowais1, Saud S. Alotaibi2, Sami Dhahbi3,4, Radwa Marzouk5, Abdullah Mohamed6, Anwer Mustafa Hilal7,*
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3419-3432, 2022, DOI:10.32604/cmc.2022.029438
    Abstract Sign language recognition can be considered as an effective solution for disabled people to communicate with others. It helps them in conveying the intended information using sign languages without any challenges. Recent advancements in computer vision and image processing techniques can be leveraged to detect and classify the signs used by disabled people in an effective manner. Metaheuristic optimization algorithms can be designed in a manner such that it fine tunes the hyper parameters, used in Deep Learning (DL) models as the latter considerably impacts the classification results. With this motivation, the current study designs the Optimal Deep Transfer Learning… More >

  • Open AccessOpen Access

    ARTICLE

    An Improved Handoff Algorithm for Heterogeneous Wireless Networks

    Deepak Dahiya1, Payal Mahajan2,*, Zaheeruddin2, Mamta Dahiya3
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3433-3453, 2022, DOI:10.32604/cmc.2022.026676
    Abstract Heterogeneous Wireless Network is currently a major area of focus in communication engineering. But the important issue in recent communication is the approachability to the wireless networks while maintaining the quality of service. Today, all the wireless access networks are working in tandem to keep the users always connected to the internet cloud that matches the price affordability and performance goals. In order to achieve seamless connectivity, due consideration has to be given to handoff precision and a smaller number of handoffs. Several researchers have used heuristic approaches to solve this issue. In the present work, a hybrid intelligent algorithm… More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid Segmentation Approach for Different Medical Image Modalities

    Walid El-Shafai1,2, Amira A. Mahmoud1, El-Sayed M. El-Rabaie1, Taha E. Taha1, Osama F. Zahran1, Adel S. El-Fishawy1, Naglaa F. Soliman3, Amel A. Alhussan4,*, Fathi E. Abd El-Samie1
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3455-3472, 2022, DOI:10.32604/cmc.2022.028722
    Abstract The segmentation process requires separating the image region into sub-regions of similar properties. Each sub-region has a group of pixels having the same characteristics, such as texture or intensity. This paper suggests an efficient hybrid segmentation approach for different medical image modalities based on particle swarm optimization (PSO) and improved fast fuzzy C-means clustering (IFFCM) algorithms. An extensive comparative study on different medical images is presented between the proposed approach and other different previous segmentation techniques. The existing medical image segmentation techniques incorporate clustering, thresholding, graph-based, edge-based, active contour, region-based, and watershed algorithms. This paper extensively analyzes and summarizes the… More >

  • Open AccessOpen Access

    ARTICLE

    Development of Mobile App to Support the Mobility of Visually Impaired People

    R. Meenakshi1, R. Ponnusamy1,*, Saleh Alghamdi2, Osama Ibrahim Khalaf3, Youseef Alotaibi4
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3473-3495, 2022, DOI:10.32604/cmc.2022.028540
    Abstract In 2017, it was estimated that the number of persons of all ages visually affected would be two hundred and eighty-five million, of which thirty-nine million are blind. There are several innovative technical solutions available to facilitate the movement of these people. The next big challenge for technical people is to give cost-effective solutions. One of the challenges for people with visual impairments is navigating safely, recognizing obstacles, and moving freely between locations in unfamiliar environments. A new mobile application solution is developed, and the application can be installed in android mobile. The application will visualize the environment with portable… More >

  • Open AccessOpen Access

    ARTICLE

    TMTACS: Two-Tier Multi-Trust-Based Algorithm to Countermeasure the Sybil Attacks

    Meena Bharti1,*, Shaveta Rani2, Paramjeet Singh2
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3497-3512, 2022, DOI:10.32604/cmc.2022.029072
    Abstract Mobile Ad hoc Networks (MANETs) have always been vulnerable to Sybil attacks in which users create fake nodes to trick the system into thinking they’re authentic. These fake nodes need to be detected and deactivated for security reasons, to avoid harming the data collected by various applications. The MANET is an emerging field that promotes trust management among devices. Transparency is becoming more essential in the communication process, which is why clear and honest communication strategies are needed. Trust Management allows for MANET devices with different security protocols to connect. If a device finds difficulty in sending a message to… More >

  • Open AccessOpen Access

    ARTICLE

    Adversarial Training Against Adversarial Attacks for Machine Learning-Based Intrusion Detection Systems

    Muhammad Shahzad Haroon*, Husnain Mansoor Ali
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3513-3527, 2022, DOI:10.32604/cmc.2022.029858
    Abstract Intrusion detection system plays an important role in defending networks from security breaches. End-to-end machine learning-based intrusion detection systems are being used to achieve high detection accuracy. However, in case of adversarial attacks, that cause misclassification by introducing imperceptible perturbation on input samples, performance of machine learning-based intrusion detection systems is greatly affected. Though such problems have widely been discussed in image processing domain, very few studies have investigated network intrusion detection systems and proposed corresponding defence. In this paper, we attempt to fill this gap by using adversarial attacks on standard intrusion detection datasets and then using adversarial samples… More >

  • Open AccessOpen Access

    ARTICLE

    Natural Language Processing with Optimal Deep Learning Based Fake News Classification

    Sara A. Althubiti1, Fayadh Alenezi2, Romany F. Mansour3,*
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3529-3544, 2022, DOI:10.32604/cmc.2022.028981
    Abstract The recent advancements made in World Wide Web and social networking have eased the spread of fake news among people at a faster rate. At most of the times, the intention of fake news is to misinform the people and make manipulated societal insights. The spread of low-quality news in social networking sites has a negative influence upon people as well as the society. In order to overcome the ever-increasing dissemination of fake news, automated detection models are developed using Artificial Intelligence (AI) and Machine Learning (ML) methods. The latest advancements in Deep Learning (DL) models and complex Natural Language… More >

  • Open AccessOpen Access

    ARTICLE

    Fast CU Partition for VVC Using Texture Complexity Classification Convolutional Neural Network

    Yue Zhang1,3,4, Pengyu Liu1,2,3,4,*, Xiaowei Jia5, Shanji Chen2, Tianyu Liu1,3,4, Chang Liu1,3,4
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3545-3556, 2022, DOI:10.32604/cmc.2022.028226
    Abstract Versatile video coding (H.266/VVC), which was newly released by the Joint Video Exploration Team (JVET), introduces quad-tree plus multi-type tree (QTMT) partition structure on the basis of quad-tree (QT) partition structure in High Efficiency Video Coding (H.265/HEVC). More complicated coding unit (CU) partitioning processes in H.266/VVC significantly improve video compression efficiency, but greatly increase the computational complexity compared. The ultra-high encoding complexity has obstructed its real-time applications. In order to solve this problem, a CU partition algorithm using convolutional neural network (CNN) is proposed in this paper to speed up the H.266/VVC CU partition process. Firstly, 64 × 64 CU… More >

  • Open AccessOpen Access

    ARTICLE

    A Computer Vision-Based Model for Automatic Motion Time Study

    Jirasak Ji, Warut Pannakkong*, Jirachai Buddhakulsomsiri
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3557-3574, 2022, DOI:10.32604/cmc.2022.030418
    Abstract Motion time study is employed by manufacturing industries to determine operation time. An accurate estimate of operation time is crucial for effective process improvement and production planning. Traditional motion time study is conducted by human analysts with stopwatches, which may be exposed to human errors. In this paper, an automated time study model based on computer vision is proposed. The model integrates a convolutional neural network, which analyzes a video of a manual operation to classify work elements in each video frame, with a time study model that automatically estimates the work element times. An experiment is conducted using a… More >

  • Open AccessOpen Access

    ARTICLE

    Performance Evaluation of Food and Beverage Listed Companies in Vietnam

    Jung-Fa Tsai1, Ngoc Huyen Nguyen1, Ming-Hua Lin2,*
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3575-3593, 2022, DOI:10.32604/cmc.2022.030476
    Abstract During the last decade, the food and beverage industry has been one of the most significant and prioritized industries that contributed to the economic growth in Vietnam. Therefore, how to enhance the performance of food and beverage firms has become a critical factor for Vietnam’s economic development. This research aims to use the data envelopment analysis (DEA) and the Malmquist productivity index (MPI) to assess changes in operational performance and productivity of listed lead food and beverage firms in Vietnam during the period between 2015 and 2020. The obtained results reveal that Vietnamese food and beverage firms were generally inefficient… More >

  • Open AccessOpen Access

    ARTICLE

    Evaluation of On-Line MPPT Algorithms for PV-Based Battery Storage Systems

    Belqasem Aljafari1, Eydhah Almatrafi2,3,4, Sudhakar Babu Thanikanti5, Sara A. Ibrahim6, Mohamed A. Enany6,*, Marwa M. Ahmed7
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3595-3611, 2022, DOI:10.32604/cmc.2022.030733
    Abstract This paper presents a novel Simulink models with an evaluation study of more widely used On-Line Maximum Power Point tracking (MPPT) techniques for Photo-Voltaic based Battery Storage Systems (PV-BSS). To have a full comparative study in terms of the dynamic response, battery state of charge (SOC), and oscillations around the Maximum Power Point (MPP) of the PV-BSS to variations in climate conditions, these techniques are simulated in Matlab/Simulink. The introduced methodologies are classified into two types; the first type is conventional hill-climbing techniques which are based on instantaneous PV data measurements such as Perturb & Observe and Incremental Conductance techniques.… More >

  • Open AccessOpen Access

    ARTICLE

    Reversible Data Hiding in Encrypted Images Based on Adaptive Prediction and Labeling

    Jiaohua Qin1,*, Zhibin He1, Xuyu Xiang1, Neal N. Xiong2
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3613-3628, 2022, DOI:10.32604/cmc.2022.030372
    Abstract Recently, reversible data hiding in encrypted images (RDHEI) based on pixel prediction has been a hot topic. However, existing schemes still employ a pixel predictor that ignores pixel changes in the diagonal direction during prediction, and the pixel labeling scheme is inflexible. To solve these problems, this paper proposes reversible data hiding in encrypted images based on adaptive prediction and labeling. First, we design an adaptive gradient prediction (AGP), which uses eight adjacent pixels and combines four scanning methods (i.e., horizontal, vertical, diagonal, and diagonal) for prediction. AGP can adaptively adjust the weight of the linear prediction model according to… More >

  • Open AccessOpen Access

    ARTICLE

    Automatic Leukaemia Segmentation Approach for Blood Cancer Classification Using Microscopic Images

    Anuj Sharma1, Deepak Prashar2, Arfat Ahmad Khan3, Faizan Ahmed Khan4, Settawit Poochaya3,*
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3629-3648, 2022, DOI:10.32604/cmc.2022.030879
    Abstract Leukaemia is a type of blood cancer that is caused by undeveloped White Blood Cells (WBC), and it is also called a blast blood cell. In the marrow of human bones, leukaemia is developed and is responsible for blood cell generation with leukocytes and WBC, and if any cell gets blasted, then it may become a cause of death. Therefore, the diagnosis of leukaemia in its early stages helps greatly in the treatment along with saving human lives. Subsequently, in terms of detection, image segmentation techniques play a vital role, and they turn out to be the important image processing… More >

  • Open AccessOpen Access

    ARTICLE

    Methods and Means for Small Dynamic Objects Recognition and Tracking

    Dmytro Kushnir*
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3649-3665, 2022, DOI:10.32604/cmc.2022.030016
    Abstract A literature analysis has shown that object search, recognition, and tracking systems are becoming increasingly popular. However, such systems do not achieve high practical results in analyzing small moving living objects ranging from 8 to 14 mm. This article examines methods and tools for recognizing and tracking the class of small moving objects, such as ants. To fulfill those aims, a customized You Only Look Once Ants Recognition (YOLO_AR) Convolutional Neural Network (CNN) has been trained to recognize Messor Structor ants in the laboratory using the LabelImg object marker tool. The proposed model is an extension of the You Only… More >

  • Open AccessOpen Access

    ARTICLE

    Exploring CNN Model with Inrush Current Pattern for Non-Intrusive Load Monitoring

    Sarayut Yaemprayoon, Jakkree Srinonchat*
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3667-3684, 2022, DOI:10.32604/cmc.2022.028358
    Abstract Non-Intrusive Load Monitoring (NILM) has gradually become a research focus in recent years to measure the power consumption in households for energy conservation. Most of the existing algorithms on NILM models independently measure when the total current load of appliances occurs, and NILM usually undergoes the problem of signatures of the appliance. This paper presents a distingue NILM design to measure and classify the appliances by investigating the inrush current pattern when the alliances begin. The proposed method is implemented while the five appliances operate simultaneously. The high sampling rate of field-programmable gate array (FPGA) is used to sample the… More >

  • Open AccessOpen Access

    ARTICLE

    Efficient Computation Offloading of IoT-Based Workflows Using Discrete Teaching Learning-Based Optimization

    Mohamed K. Hussein1,*, Mohamed H. Mousa1,2
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3685-3703, 2022, DOI:10.32604/cmc.2022.026370
    Abstract As the Internet of Things (IoT) and mobile devices have rapidly proliferated, their computationally intensive applications have developed into complex, concurrent IoT-based workflows involving multiple interdependent tasks. By exploiting its low latency and high bandwidth, mobile edge computing (MEC) has emerged to achieve the high-performance computation offloading of these applications to satisfy the quality-of-service requirements of workflows and devices. In this study, we propose an offloading strategy for IoT-based workflows in a high-performance MEC environment. The proposed task-based offloading strategy consists of an optimization problem that includes task dependency, communication costs, workflow constraints, device energy consumption, and the heterogeneous characteristics… More >

  • Open AccessOpen Access

    ARTICLE

    Non-Negative Minimum Volume Factorization (NMVF) for Hyperspectral Images (HSI) Unmixing: A Hybrid Approach

    Kriti Mahajan1, Urvashi Garg1, Nitin Mittal2, Yunyoung Nam3, Byeong-Gwon Kang4,*, Mohamed Abouhawwash5,6
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3705-3720, 2022, DOI:10.32604/cmc.2022.027936
    Abstract Spectral unmixing is essential for exploitation of remotely sensed data of Hyperspectral Images (HSI). It amounts to the identification of a position of spectral signatures that are pure and therefore called end members and their matching fractional, draft rules abundances for every pixel in HSI. This paper aims to unmix hyperspectral data using the minimal volume method of elementary scrutiny. Moreover, the problem of optimization is solved by the implementation of the sequence of small problems that are constrained quadratically. The hard constraint in the final step for the abundance fraction is then replaced with a loss function of hinge… More >

  • Open AccessOpen Access

    ARTICLE

    A Sea Ice Recognition Algorithm in Bohai Based on Random Forest

    Tao Li1, Di Wu1, Rui Han2, Jinyue Xia3, Yongjun Ren4,*
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3721-3739, 2022, DOI:10.32604/cmc.2022.029619
    Abstract As an important maritime hub, Bohai Sea Bay provides great convenience for shipping and suffers from sea ice disasters of different severity every winter, which greatly affects the socio-economic and development of the region. Therefore, this paper uses FY-4A (a weather satellite) data to study sea ice in the Bohai Sea. After processing the data for land removal and cloud detection, it combines multi-channel threshold method and adaptive threshold algorithm to realize the recognition of Bohai Sea ice under clear sky conditions. The random forests classification algorithm is introduced in sea ice identification, which can achieve a certain effect of… More >

  • Open AccessOpen Access

    ARTICLE

    Binary Tomography Reconstruction with Limited-Data by a Convex Level-Set Method

    Haytham A. Ali1,2,*, Hiroyuki Kudo1
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3741-3756, 2022, DOI:10.32604/cmc.2022.029394
    Abstract This paper proposes a new level-set-based shape recovery approach that can be applied to a wide range of binary tomography reconstructions. In this technique, we derive generic evolution equations for shape reconstruction in terms of the underlying level-set parameters. We show that using the appropriate basis function to parameterize the level-set function results in an optimization problem with a small number of parameters, which overcomes many of the problems associated with the traditional level-set approach. More concretely, in this paper, we use Gaussian functions as a basis function placed at sparse grid points to represent the parametric level-set function and… More >

  • Open AccessOpen Access

    ARTICLE

    Optimal Deep Canonically Correlated Autoencoder-Enabled Prediction Model for Customer Churn Prediction

    Olfat M. Mirza1, G. Jose Moses2, R. Rajender3, E. Laxmi Lydia4, Seifedine Kadry5, Cheadchai Me-Ead6, Orawit Thinnukool7,*
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3757-3769, 2022, DOI:10.32604/cmc.2022.030428
    Abstract Presently, customer retention is essential for reducing customer churn in telecommunication industry. Customer churn prediction (CCP) is important to predict the possibility of customer retention in the quality of services. Since risks of customer churn also get essential, the rise of machine learning (ML) models can be employed to investigate the characteristics of customer behavior. Besides, deep learning (DL) models help in prediction of the customer behavior based characteristic data. Since the DL models necessitate hyperparameter modelling and effort, the process is difficult for research communities and business people. In this view, this study designs an optimal deep canonically correlated… More >

  • Open AccessOpen Access

    ARTICLE

    Characteristics of Desertification Change in Lake Basin Area in Gangcha County

    Wenzheng Yu1, Mingxuan Zhu1, Li Shao1, Yanbo Shen2,3,*, Haitao Liu1, Tianliang Chen1, Hanxiaoya Zhang4
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3771-3793, 2022, DOI:10.32604/cmc.2022.027094
    Abstract Qinghai Lake Basin area in Gangcha county is selected as the study area in terms of desertification change features in this paper. Based on the remote sensing (RS) and global positioning system (GPS) technologies, the desertification information range from 1989 to 2014 in the study area is extracted. Using the method of the decision tree, the desertification in the research area is been divided into four grades including mild desertification, moderate desertification, severe desertification and serious desertification. The change characteristics of desertification in the study area were analyzed in detail, which showed that the desertification in the study area experienced… More >

  • Open AccessOpen Access

    ARTICLE

    Deep CNN Model for Multimodal Medical Image Denoising

    Walid El-Shafai1,2, Amira A. Mahmoud1, Anas M. Ali1,3, El-Sayed M. El-Rabaie1, Taha E. Taha1, Osama F. Zahran1, Adel S. El-Fishawy1, Naglaa F. Soliman4, Amel A. Alhussan5,*, Fathi E. Abd El-Samie1
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3795-3814, 2022, DOI:10.32604/cmc.2022.029134
    Abstract In the literature, numerous techniques have been employed to decrease noise in medical image modalities, including X-Ray (XR), Ultrasonic (Us), Computed Tomography (CT), Magnetic Resonance Imaging (MRI), and Positron Emission Tomography (PET). These techniques are organized into two main classes: the Multiple Image (MI) and the Single Image (SI) techniques. In the MI techniques, images usually obtained for the same area scanned from different points of view are used. A single image is used in the entire procedure in the SI techniques. SI denoising techniques can be carried out both in a transform or spatial domain. This paper is concerned… More >

  • Open AccessOpen Access

    ARTICLE

    A Structural Topic Model for Exploring User Satisfaction with Mobile  Payments

    Jang Hyun Kim1,2,3, Jisung Jang1,3, Yonghwan Kim4, Dongyan Nan1,2,*
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3815-3826, 2022, DOI:10.32604/cmc.2022.029507
    Abstract This study explored user satisfaction with mobile payments by applying a novel structural topic model. Specifically, we collected 17,927 online reviews of a specific mobile payment (i.e., PayPal). Then, we employed a structural topic model to investigate the relationship between the attributes extracted from online reviews and user satisfaction with mobile payment. Consequently, we discovered that “lack of reliability” and “poor customer service” tend to appear in negative reviews. Whereas, the terms “convenience,” “user-friendly interface,” “simple process,” and “secure system” tend to appear in positive reviews. On the basis of information system success theory, we categorized the topics “convenience,” “user-friendly… More >

  • Open AccessOpen Access

    ARTICLE

    Encryption Algorithm for Securing Non-Disclosure Agreements in Outsourcing Offshore Software Maintenance

    Atif Ikram1,2,*, Masita Abdul Jalil1, Amir Bin Ngah1, Nadeem Iqbal2, Nazri Kama4, Azri Azmi4, Ahmad Salman Khan3, Yasir Mahmood3,4, Assad Alzayed5
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3827-3845, 2022, DOI:10.32604/cmc.2022.029609
    Abstract Properly created and securely communicated, non-disclosure agreement (NDA) can resolve most of the common disputes related to outsourcing of offshore software maintenance (OSMO). Occasionally, these NDAs are in the form of images. Since the work is done offshore, these agreements or images must be shared through the Internet or stored over the cloud. The breach of privacy, on the other hand, is a potential threat for the image owners as both the Internet and cloud servers are not void of danger. This article proposes a novel algorithm for securing the NDAs in the form of images. As an agreement is… More >

  • Open AccessOpen Access

    ARTICLE

    Automatic Botnet Attack Identification Based on Machine Learning

    Peng Hui Li1, Jie Xu1,*, Zhong Yi Xu1, Su Chen1, Bo Wei Niu2, Jie Yin1, Xiao Feng Sun1, Hao Liang Lan1, Lu Lu Chen3
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3847-3860, 2022, DOI:10.32604/cmc.2022.029969
    Abstract At present, the severe network security situation has put forward high requirements for network security defense technology. In order to automate botnet threat warning, this paper researches the types and characteristics of Botnet. Botnet has special characteristics in attributes such as packets, attack time interval, and packet size. In this paper, the attack data is annotated by means of string recognition and expert screening. The attack features are extracted from the labeled attack data, and then use K-means for cluster analysis. The clustering results show that the same attack data has its unique characteristics, and the automatic identification of network… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Mode Frequency Reconfigurable Conformal Antenna for Modern Electronic Systems

    Abir Zaidi1, Esraa Mousa Ali2, Abdullah G. Alharbi3, Salah Ud-Din Khan4, Mohammad Alsharef5, Mohammed S. Alzaidi5, Sherif S. M. Ghoneim5,*
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3861-3877, 2022, DOI:10.32604/cmc.2022.029889
    Abstract The article presents a miniaturized monopole antenna dedicated to modern flexible electronic systems. The antenna combines three fundamental properties in a single structure. Firstly, it is characterized by a compact size compared to the state-of-the-art literature with an overall size of 18 × 18 × 0.254 mm3, secondly, the proposed antenna integrates the reconfigurability function of frequency, produced by means of a Positive-Intrinsic-Negative (PIN) diode introduced into the radiating element. Thus, the antenna is able to switch between different frequencies and different modes, making it suitable to meet the ever-changing demands of communication systems. third, the antenna is equipped by the property of flexibility.… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Scale Network with Integrated Attention Unit for Crowd Counting

    Adel Hafeezallah1, Ahlam Al-Dhamari2,3,*, Syed Abd Rahman Abu-Bakar2
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3879-3903, 2022, DOI:10.32604/cmc.2022.028289
    Abstract Estimating the crowd count and density of highly dense scenes witnessed in Muslim gatherings at religious sites in Makkah and Madinah is critical for developing control strategies and organizing such a large gathering. Moreover, since the crowd images in this case can range from low density to high density, detection-based approaches are hard to apply for crowd counting. Recently, deep learning-based regression has become the prominent approach for crowd counting problems, where a density-map is estimated, and its integral is further computed to acquire the final count result. In this paper, we put forward a novel multi-scale network (named 2U-Net)… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Transfer Learning Driven Oral Cancer Detection and Classification Model

    Radwa Marzouk1, Eatedal Alabdulkreem2, Sami Dhahbi3, Mohamed K. Nour4, Mesfer Al Duhayyim5, Mahmoud Othman6, Manar Ahmed Hamza7,*, Abdelwahed Motwakel7, Ishfaq Yaseen7, Mohammed Rizwanullah7
    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3905-3920, 2022, DOI:10.32604/cmc.2022.029326
    Abstract Oral cancer is the most commonly occurring ‘head and neck cancers’ across the globe. Most of the oral cancer cases are diagnosed at later stages due to absence of awareness among public. Since earlier identification of disease is essential for improved outcomes, Artificial Intelligence (AI) and Machine Learning (ML) models are used in this regard. In this background, the current study introduces Artificial Intelligence with Deep Transfer Learning driven Oral Cancer detection and Classification Model (AIDTL-OCCM). The primary goal of the proposed AIDTL-OCCM model is to diagnose oral cancer using AI and image processing techniques. The proposed AIDTL-OCCM model involves… More >

Per Page:

Share Link